Malicious File Detection Using Yara

Critical Nessus Plugin ID 91990

Synopsis

Nessus detected malicious files on the remote host.

Description

Nessus detected one or more files on the remote Windows host that match a Yara rule.

Note that Nessus has only scanned files with the following extensions :

.application, .asp, .aspx, .bat, .chm, .class, .cmd, .com, .cp, .csh, .dl, .doc, .docx, .drv, .exe, .gadget, .hta, .inf, .ins, .inx, .isu, .jar, .job, .jpeg, .jpg, .js, .jse, .jse, .jsp, .lnk, .msc, .msi, .msp, .mst, .paf, .pdf, .php, .pif, .ppt, .pptx, .ps1, .ps1xm, .ps2, .ps2xm, .psc1, .psc2, .reg, .rgs, .scf, .scr, .sct, .shb, .shs, .swf, .sys, .u3p, .vb, .vbe, .vbs, .vbscript, .ws, .wsf, .xls, .xls

See Also

http://virustotal.github.io/yara/

Plugin Details

Severity: Critical

ID: 91990

File Name: wmi_malware_yara_filesystem.nbin

Version: 1.80

Type: local

Agent: windows

Family: Windows

Published: 2016/07/11

Updated: 2019/06/17

Dependencies: 59275

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

Required KB Items: malscan/enabled